Switzerland’s Salt Picks Nokia for 5G
The three Swiss wireless service providers are gearing up for 5G, although when the spectrum auction process will begin still seems unclear.
The three Swiss wireless service providers are gearing up for 5G, although when the spectrum auction process will begin still seems unclear.
Continue reading "Interview with Juniper Networks Ambassador Dan Hearty"
One analyst called the announcement “brilliant” because it is designed to help enterprise IT shops deal with “IoT havoc as the network edge is now stretched to the last connected device.”
Rami Rahim said new products, including an MX line card targeting carrier 5G deployments, a new 400G platform, and silicon photonics capabilities, will return Juniper to growth during the second half of the year.
The second 5 percent chunk of server shipment market share for chip maker AMD is probably going to come easier than the first 5 percent share, which was attained as AMD exited the fourth quarter and, significantly, was a stake in the ground that chief executive officer Lisa Su drove into the ground in late 2016 as the “Naples” Epyc ramp got under way. …
AMD Nails Its Epyc Server Targets For 2018 was written by Nicole Hemsoth at .

Some general thoughts on placing switch in middle of rack
The post Middle of Rack vs Top of Rack Switch Placement appeared first on EtherealMind.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – ILNP and IP Mobility – Saleem Bhatti appeared first on Network Collective.

When’s the last time you thought about risk? It’s something we have to deal with every day but hardly ever try to quantify unless we work in finance or a high-stakes job. When it comes to IT work, we take risks all the time. Some are little, like deleting files or emails thinking we won’t need them again. Or maybe they’re bigger risks, like deploying software to production or making a change that could take a site down. But risk is a part of our lives. Even when we can’t see it.
Mitigating risk is the most common thing we have to do when we analyze situations where risk is involved. Think about all the times you’ve had to create a backout plan for a change that you’re checking in. Even having a maintenance window is a form of risk mitigation. I was once involved in a cutover for a metro fiber deployment that had to happen between midnight and 2 am. When I asked why, the tech said, “Well, we don’t usually have any problems, but sometimes there’s a hiccup that takes the whole network down until we fix it. This way, there isn’t as much traffic Continue reading

A long-time multistakeholder and international approach toward creating Internet policy is breaking down, with individual nations and some large companies increasingly deciding to go their own way and create their own rules, some Internet governance experts say.
The multistakeholder decision-making model that created the Internet’s policy standards over the last two decades has largely fallen apart, with countries pushing their own agendas related to privacy, censorship, encryption, Internet shutdowns and other issues, some of the experts said Tuesday at the State of the Net tech policy conference in Washington, D.C.
Recent efforts to keep the Internet safe for free expression and free enterprise are “mission impossible,” said Steve DelBianco, president and CEO of Internet-focused trade group NetChoice.
Back in the early 2000s, the Internet was enabling the disruption of governments and powerful businesses by providing users ways to work around those organizations, DelBianco added. “Fifteen years later, I’d have to say that governments and big businesses have regained their footing and are reasserting control,” he said.
Many nations are looking for new ways to control Internet content and users, added Laura DeNardis, a communications professor at American University and a scholar focused on Internet architecture and governance.
For many Continue reading
It all started in early December on twitter. Community I could not have said it better than David said it, This is what community is! You, me, all of us, nobody gets left behind and we get to contribute so... Read More ›
The post Community: #One4All #All4One appeared first on Networking with FISH.
Veritas: shared verifiable databases and tables in the cloud Allen et al., CIDR’19
Two (or more) parties want to transact based on the sharing of information (e.g. current offers). In order to have trust in the system and provide a foundation for resolving disputes, we’d like a tamperproof and immutable audit log of all shared data and actions, such that an independent auditor can reconstruct the state of the system at any point in time.
Enter the blockchain?! Not so fast say Allen et al., blockchain technology as we know it today is ‘one step forward, two steps back’ ;).
Today, for gaining immutability and auditability with new blockchain platforms, we give up decades of research in data management— and hardened, enterprise-ready code that implements these ideas.
We’d still like to be able to use SQL for example. We want transaction throughput much closer to a traditional database, and we want to take advantage of query optimisation and sophisticated query processing engines. We could try adding database like features to blockchain systems, but that looks to be a long road:
There are now a gazillion start-ups that are adding these basic database features to blockchains, Continue reading
Job site Indeed found that listings for “data scientist" have surged 344 percent over the past five years.

Will you be at the ICANN 64 meeting in March 2019 in Kobe, Japan? If so (or if you can get to Kobe), would you be interested in speaking about any work you have done (or are doing) with DNSSEC, DANE or other DNS security and privacy technologies? If you are interested, please send a brief (1-2 sentence) description of your proposed presentation to [email protected] before 07 February 2019.
The DNSSEC Deployment Initiative and the Internet Society Deploy360 Programme, in cooperation with the ICANN Security and Stability Advisory Committee (SSAC), are planning a DNSSEC Workshop during the ICANN64 meeting held from 09-14 March 2019 in Kobe, Japan. The DNSSEC Workshop has been a part of ICANN meetings for several years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments.
For reference, the most recent session was held at the ICANN Annual General Meeting in Barcelona, Spain, on 24 October 2018. The presentations and transcripts are available at: https://63.schedule.icann.org/meetings/901549, https://63.schedule.icann.org/meetings/901554, and https://63.schedule.icann.org/meetings/901555.
At ICANN64 we are particularly interested in live demonstrations of Continue reading
Ayar Labs, a silicon photonics startup based in Emeryville, California, is getting set to tape out its electro-optical I/O chip, which will become the basis of its first commercial product. …
First Silicon for Photonics Startup with DARPA Roots was written by Michael Feldman at .